an iSAFE presentation 2008 iSAFE Inc 2008 iSAFE
- Slides: 21
an i-SAFE presentation © 2008 i-SAFE Inc. © 2008 i-SAFE
Learning Goals YOU WILL: • Understand that an online stranger is anyone met exclusively online • Be able to list safety rules/advice of behavior towards strangers in the physical community that also apply to behavior towards strangers in Cyberspace • Recognize steps in an online predator’s grooming process • Know how to interact online appropriately and safely © 2008 i-SAFE Inc.
Do You Go Online? Discuss: Do you go online alone? What do you do online? How do you know how old someone is that you meet online? © 2008 i-SAFE Inc.
Group Activity Your teacher will provide you with activity instructions. © 2008 i-SAFE Inc.
Stranger When online, who should be categorized as a stranger? Anyone met exclusively online (not already known from the physical community) is an online stranger. © 2008 i-SAFE Inc.
Stranger Discuss: What rules do you follow in the physical world for meeting or communicating with strangers? Do these rules also apply to the cyber community? REMEMBER: Anyone you meet online is a stranger to you, no matter how well you think you know them. © 2008 i-SAFE Inc.
Online Socializing To socialize online means to interact with others using Internet technologies. Name some ways people socialize online. • Name your favorite ways to socialize online. • List some good rules to help us (even adults) stay safe when socializing online. • © 2008 i-SAFE Inc.
Online Realities Sometimes people lie about who they are when socializing online. • This could be because they want to bully or steal identities. • It also could be that they are just exploring and experimenting. Sometimes adults lie online in order to meet and form friendships with youth. They are called predators. © 2008 i-SAFE Inc.
Minimizing Danger There are things you can do to minimize the danger and the chances of becoming the victim of an online predator, including the following: • Choose a safe screen name • Use caution when choosing whom to communicate with • Avoid revealing too much personal information No matter what, it is important to tell an adult if: • You feel uncomfortable online for any reason • You are approached by someone who discusses inappropriate things • You are approached by someone who wants to meet you offline © 2008 i-SAFE Inc.
The Grooming Process “Grooming process” is a term for the steps an online predator may use to make friends on the Internet. Let’s go over the grooming process flyer together now! © 2008 i-SAFE Inc.
The Grooming Process SIMILAR INTERESTS An online predator will establish a relationship by discussing common interests, likes and dislikes with the intended victim. This leads to a feeling of familiarity and friendship. Once the grooming process starts, the victim feels like he or she really knows the predator – it is difficult to consider this “friend” a “stranger”. © 2008 i-SAFE Inc.
Similar Interests Protect yourself: • Review the information you have posted about yourself online – A predator may search online profiles and screen names for interest topics such as particular sports or hobbies, as well as birth dates or ages. • Think carefully when communicating with people you know only online (strangers) – You could be encouraging unwanted or even dangerous behavior with what you say. © 2008 i-SAFE Inc.
The Grooming Process TRUST A predator will want to listen to anything that the victim wants to talk about in order to build a feeling of trust. © 2008 i-SAFE Inc.
Trust Protect yourself: • Think about what you are saying about yourself online – Is it appropriate information to give a stranger? • Think about how you are feeling when you go online – A predator will target those who appear to be lonely or depressed. Talk to a friend offline. BEST ADVICE – Find a trusted friend OFFLINE to help with a problem. © 2008 i-SAFE Inc.
The Grooming Process SECRECY • As the relationship progresses a predator may ask the victim to keep the friendship secret from others. • This approach gives the predator confidence that it will be more difficult for an adult to step in and protect the victim. © 2008 i-SAFE Inc.
Secrecy Protect yourself: • Avoid people online who ask you to keep your friendship secret – Think about it: there is no good reason to keep an online friendship secret. • NEVER respond to a threat anyone makes online – One who makes threats cannot be trusted. Tell someone OFFLINE if you are threatened. © 2008 i-SAFE Inc.
Secrecy in a relationship may lead to the exchange of inappropriate language, pictures or videos. Protect yourself: • Reject any inappropriate material received online – Report it to a trusted adult OFFLINE. © 2008 i-SAFE Inc.
Activity Take time to decorate your flyer. Hang them where others can learn about predators and the grooming process. © 2008 i-SAFE Inc.
Remember • Anyone met online is a stranger. • Be SAFE when socializing online: – Be careful when choosing screen names and posting personal information online. – Tell your friends and parents about those you meet online. – Report online behaviors of others that make you uncomfortable. © 2008 i-SAFE Inc.
Review • What are the steps in the grooming process? • How can knowing these steps make you more confident users of Internet communications? © 2008 i-SAFE Inc.
Thank you for participating in this i-SAFE presentation. Duplication and/or selling of the information contained within this document, or any other form of unauthorized use of this copyrighted material, is against the law and a punishable crime. © 2008 i-SAFE Inc.
- 2008 2008
- Pearson education inc publishing as pearson prentice hall
- 2008 pearson prentice hall inc
- 2008 pearson prentice hall inc
- Pearson education
- 2008 pearson education inc
- 2008 pearson education inc
- 2008 pearson education inc
- 2008 pearson education inc
- 2008 pearson education inc
- 2008 pearson education inc
- 2008
- Vertex presentation and cephalic presentation
- Vertex presentation and cephalic presentation
- Ipam windows server 2008
- 2008-2009 school year
- The gipsy (magna), 2008
- Vera 2008
- Microsoft server
- 2008 generation called
- Keruntutan penyampaian teks ulasan
- Ssis 2008 training